Loading

User Discovery via Whoami

Warning

This rule has been deprecated as of 2021/04/15.

The whoami application was executed on a Linux host. This is often used by tools and persistence mechanisms to test for privileged access.

Rule type: query
Rule indices:

  • auditbeat-*
  • logs-endpoint.events.*

Rule Severity: low
Risk Score: 21
Runs every:
Searches indices from: now-9m
Maximum alerts per execution: 100
References:

Tags:

  • Elastic
  • Host
  • Linux
  • Threat Detection
  • Discovery

Version: 100
Rule authors:

  • Elastic

Rule license: Elastic License v2

event.category:process and event.type:(start or process_started) and process.name:whoami
		

Framework: MITRE ATT&CK